Managing user access
As a Remediate administrator, you can create new user accounts and assign group-based access privileges to them.
When you first install Remediate, you have one default superuser account: admin. Admin users have full access to all Remediate user interface functionality and can add and manage other users.
Role | Username | Default password | Permissions |
---|---|---|---|
Administrator | admin | @Admin |
|
Manage user accounts
As an admin user, you can add, view, update or delete additional user accounts and assign them to groups.
The following groups are available to add to accounts:
Permission Group | Description |
---|---|
accept-risk | Accept risk for a given vulnerability on selected nodes. |
add-credential | Add access credentials for a node. |
add-source | Add a vulnerability scanner or infrastructure source. |
add-task | Add a new remediation task. |
admin | Complete first-run configuration. Members of this group also have all the permissions of the admin superuser role except the ability to login into the user administration UI and manage users. |
remove-credential | Remove access credentials for a node. |
remove-source | Remove a vulnerability scanner or infrastructure source. |
remove-task | Remove a new remediation task. |
run-task | Run a remediation task. |
Each group represents a user privilege that be granted to a user account. If you do not add any groups to a user account, that user only has read-only access to the Remediate UI.
In addition to creating user accounts manually, you can also configure remediate to pull user information from your LDAP or Active Directory server.
-
Add new users
As a user administration UI admin user, you can add new user accounts and assign them group privileges. -
Update a user
From time to time you might need to change a user’s password, or update the groups assigned to their account. -
Delete a user
Remediate administrators can delete other user accounts, including admin accounts. -
Force log out
Holders of the admin account can force other users to log out. -
LDAP configuration
You can set up Remediate to use LDAP content to authenticate users. -
Active Directory configuration
You can set up Remediate to use Active Directory to authenticate users. -
LDAP mappers
LDAP mappers are listeners, which are triggered by the LDAP Provider at various points, and provide another extension point to LDAP integration. -
Work with user groups in Remediate
Puppet Remediate provides a limited number of roles that allow you to control what users can and can’t do.